Limin Yang
Limin Yang
CS Ph.D. Candidate, UIUC
Verified email at - Homepage
Cited by
Cited by
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
Measuring and Modeling the Label Dynamics of Online {Anti-Malware} Engines
S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song, G Wang
29th USENIX Security Symposium (USENIX Security 20), 2361-2378, 2020
Opening the blackbox of virustotal: Analyzing online phishing scan engines
P Peng, L Yang, L Song, G Wang
Proceedings of the Internet Measurement Conference, 478-485, 2019
{CADE}: Detecting and explaining concept drift samples for security applications
L Yang, W Guo, Q Hao, A Ciptadi, A Ahmadzadeh, X Xing, G Wang
30th USENIX Security Symposium (USENIX Security 21), 2327-2344, 2021
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics
M Xue, L Yang, KW Ross, H Qian
Peer-to-peer networking and applications 10 (2), 357-367, 2017
A case study of the security vetting process of smart-home assistant applications
H Hu, L Yang, S Lin, G Wang
2020 IEEE Security and Privacy Workshops (SPW), 76-81, 2020
Vuldigger: A just-in-time and cost-aware tool for digging vulnerability-contributing changes
L Yang, X Li, Y Yu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
BODMAS: An open dataset for learning based temporal analysis of PE malware
L Yang, A Ciptadi, I Laziuk, A Ahmadzadeh, G Wang
2021 IEEE Security and Privacy Workshops (SPW), 78-84, 2021
Benchmarking label dynamics of VirusTotal engines
S Zhu, Z Zhang, L Yang, L Song, G Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
The system can't perform the operation now. Try again later.
Articles 1–9